Thu.Jan 05, 2023

article thumbnail

Weekly Update 329

Troy Hunt

Strap yourself in, this is a big one! Big video, big breach (scrape?), and a big audience today. The Twitter incident consumed a heap of my time before, during and after this live stream, but then I go and get a sudden itch to do stuff like the number plate capturing and, well, there goes even more hours I don't have. But hey, I love what I do and I have no regrets, I hope you enjoy watching this week's vid 😊 Oh - one more thing: today I set up an official Mastodon account for

article thumbnail

Cloud email services bolster encryption against hackers

Tech Republic Security

Google, Microsoft and Proton launched new end-to-end encryption products to confront the 50% increase in ransomware, phishing and other email-vector attacks from the first half of 2022. The post Cloud email services bolster encryption against hackers appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Slack's private GitHub code repositories stolen over holidays

Bleeping Computer

Slack suffered a security incident over the holidays affecting some of its private GitHub code repositories. [.].

145
145
article thumbnail

How to configure an SMTP server in a self-hosted instance Passbolt

Tech Republic Security

With the self-hosted Passbolt password manager, you must configure an SMTP server to use the collaboration features. Learn how to do it. The post How to configure an SMTP server in a self-hosted instance Passbolt appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

200M Twitter Profiles, with Email Addys, Dumped on Dark Web for Free

Dark Reading

A data dump of Twitter user details on an underground forum appears to stem from an API endpoint compromise and large-scale data scraping.

141
141
article thumbnail

What Should You Expect From The Best Washington DC IT Support?

SecureBlitz

The business world continues to develop and advance. Nowadays, technology plays a crucial role in almost every industry, and you do not want to be left behind. It’s critical to implement technology as much as possible in your business and start benefiting from all its advantages. For that reason, you need to look for the […]. The post What Should You Expect From The Best Washington DC IT Support?

LifeWorks

More Trending

article thumbnail

NATO tests AI’s ability to protect critical infrastructure against cyberattacks

CSO Magazine

Autonomous intelligence, artificial intelligence (AI) that can act without human intervention, can help identify critical infrastructure cyberattack patterns and network activity, and detect malware to enable enhanced decision-making about defensive responses. That’s according to the preliminary findings of an international experiment of AI’s ability to secure and defend systems, power grids and other critical assets by cyber experts at the North Atlantic Treaty Organization’s (NATO) Cyber Coali

article thumbnail

Cricket Platform Exposed over 100k Customer Data Entries

Heimadal Security

Over 100k user entries and administrative credentials were leaked from a cricket community social network. Cybernews researchers discovered that cricketsocial[.]com left an open database containing emails, phone numbers, names, hashed user passwords, dates of birth, and addresses. Most of the entries appear to be test data, but the team’s study suggests that some are personally […].

Passwords 119
article thumbnail

Ransomware target list – Week in security with Tony Anscombe

We Live Security

Tony reviews the latest developments on the ransomware scene and examines the challenge that ransomware poses for schools, hospitals and local governments. The post Ransomware target list – Week in security with Tony Anscombe appeared first on WeLiveSecurity.

article thumbnail

CISOs Clamor for Better App Monitoring Tools

Security Boulevard

In the history of IT security, the sector’s traditional tools and solutions have rarely appeared as inadequate as they do now. Over the past four years, the multitude of ransomware attacks resulted in scores of breaches and generated a long string of embarrassing headlines: Colonial Pipeline, JBS and Kaseya, among others. There are many causes. The post CISOs Clamor for Better App Monitoring Tools appeared first on Security Boulevard.

CISO 23
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Data Security Threat to UK Government Ministers and Civil Servants

CyberSecurity Insiders

All the ministers and government employees working in the UK were issued a warning when their official contact details were publicly available online until March 2020. The Government Communication Service website was publicly displaying information of about 45k Govt employees and details include email address, phone numbers and job titles, along with the social media account handles of some ministers and civil servants, including their Twitter and LinkedIn profiles.

article thumbnail

Ransomware: Protect Your Data Backups, Too

Security Boulevard

Ransomware continues to be a growing and increasingly dangerous threat to businesses. The numbers are ominous: Every 11 seconds a business experiences a ransomware attack, according to current research from Veeam. Most organizations recognize the urgency of protecting their networks, but they may not realize that’s only half the battle. Experience shows that virtually all attackers.

Backups 114
article thumbnail

Rackspace Sunsets Email Service Downed in Ransomware Attack

Dark Reading

The hosting services provider shared new details on the breach that took down its Hosted Exchange Email service.

article thumbnail

Meta Fined $414 Million by Irish Regulators for Using Personal Data for Advertising

Heimadal Security

In what might be a severe blow to its ad-fueled business model, the Irish Data Protection Commission (DPC) has fined Facebook’s parent company Meta $414 million for its management of user data for distributing personalized ads. Privacy regulators ordered Meta Ireland to pay two fines, one over violations of the E.U. General Data Protection Regulation […].

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

After hack, CircleCI tells devs to update secrets now

Security Boulevard

In this latest attack on software development environments, the CircleCI platform may have exposed secrets used by millions of software developers. A security breach of the CircleCI development platform has exposed security tokens and other secrets used by more than a million developers, the company said in a statement on Wednesday. . The post After hack, CircleCI tells devs to update secrets now appeared first on Security Boulevard.

Hacking 105
article thumbnail

S3 Ep116: Last straw for LastPass? Is crypto doomed? [Audio + Text]

Naked Security

Lots of big issues this week: breaches, encryption, supply chains and patching problems. Listen now! (Full transcript inside.).

article thumbnail

Google patches 60 vulnerabilities in first Android update of 2023

Malwarebytes

Google has published its first security bulletin of 2023 with details of security vulnerabilities affecting Android devices. Patch level 2023-01-01 includes 20 issues and patch level 2023-01-05 includes fixes for another 40 issues. The Android security patch level refers to a monthly manifest of security patches rolled out by Google in an effort to close up security holes and malicious code exploits in the Android OS.

article thumbnail

How hackers might be exploiting ChatGPT

Security Affairs

The popular AI chatbot ChatGPT might be used by threat actors to hack easily hack into target networks. Original post at [link]. Cybernews research team discovered that the AI-based chatbot ChatGPT – a recently launched platform that caught the online community’s attention – could provide hackers with step-by-step instructions on how to hack websites.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

How to Prevent Identity Theft With 20 Essential Steps [Updated 2023]

Heimadal Security

Identity theft is a growing problem in today’s digital world. With more of our personal information available online, it can be difficult to protect ourselves from malicious actors who may use our data for malicious purposes. While it might seem like an intimidating issue to tackle, this 20 steps guide on how to prevent identity […]. The post How to Prevent Identity Theft With 20 Essential Steps [Updated 2023] appeared first on Heimdal Security Blog.

article thumbnail

Irish Data Protection Commission fined Meta $414 Million

Security Affairs

The Irish Data Protection Commission (DPC) fined Meta Platforms €390 million over data processing operations for the delivery of its services. The Data Protection Commission (DPC) concluded two inquiries into the data processing operations of Meta Platforms Ireland Limited (“Meta Ireland”) over the delivery of its Facebook and Instagram services. DPC fined Meta Platforms a total of €390 million (roughly $414 million). “Final decisions have now been made by the DPC in which it has fined Met

article thumbnail

FBI warns of imposter ads in search results

Malwarebytes

The FBI has issued a public notice which includes advice to block adverts. Why? Let’s take a look. The bogus advert tightrope. It’s no secret that rogue ads have been a particular plague on the Internet for as far back as we can remember. From irritating pop ups and spinning “You’ve won a prize” banners to adverts pushing malicious redirects and malvertising, you never quite know what’s waiting in your browser when the page you request loads up.

article thumbnail

Threat actors stole Slack private source code repositories

Security Affairs

Enterprise collaboration platform Slack disclosed a data breach, hackers stole some of its private source code repositories. The enterprise collaboration platform Slack has announced to have suffered a security breach, threat actors have stolen some of its private source code repositories. The company pointed out that its customers were not affected. “We recently became aware of a security issue involving unauthorized access to a subset of Slack’s code repositories.” reads the securi

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Slack GitHub Account Hacked via Stolen Employee API Token

Security Boulevard

On December 29, 2022, Slack was alerted to suspicious activity on their GitHub account. Upon investigation, the company discovered that a limited number of employee tokens had been stolen and misused to gain access to an externally hosted repository. The threat actor had also downloaded private code repositories on December 27, but neither Slack’s primary [.].

article thumbnail

Zoho urges fixing a critical SQL Injection flaw in ManageEngine

Security Affairs

Zoho is warning its customers of a critical vulnerability, tracked as CVE-2022-47523, affecting multiple ManageEngine products. Zoho is urging its customers to address a critical SQL Injection vulnerability, tracked as CVE-2022-47523, that affects multiple ManageEngine products. “This security advisory is to let you know that a high severity vulnerability was detected in ManageEngine Password Manager Pro.” reads the advisory published by Zoho. “An SQL Injection vulnerability(CV

article thumbnail

Malware targets 30 unpatched WordPress plugins

Malwarebytes

If you make use of plugins on your WordPress site (and you probably do), it’s time to take a good look at what’s running under the hood. Ars Technica reports that unpatched vulnerabilities being exploited across no fewer than 30 plugins. A long list of plugin problems. If you own or operate a website there is a very good chance it uses WordPress.

Malware 98
article thumbnail

What the TikTok data privacy settlement means for your school district

Security Boulevard

Social media: Two words that would probably give most K-12 school districts a major headache. It’s almost a universal truth in education that students are prone to posting, sharing, and commenting inappropriate things online. That risk is, in and of itself, a constant struggle for school IT departments. What’s even more concerning is that you […]. The post What the TikTok data privacy settlement means for your school district appeared first on ManagedMethods.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Five Guys Burglary: Hackers Take a Bite Out of Burger Chain

SecureWorld News

Popular hamburger chain Five Guys recently announced in a consumer notification letter that the company experienced a security incident possibly impacting personal information of employees and customers. The letter says the company discovered the incident on September 17, 2022, which involved unauthorized access to some files on a server. Five Guys Enterprises immediately implemented its incident response plan and launched an investigation into the incident.

article thumbnail

200 Million Twitter Profiles Database Giveaway on Hacker Forum

Heimadal Security

Threat actors offer over 200 million Twitter users` profile data on the Breached hacker forum, asking no more than $2 for the whole database. Cyber researchers say this is the cleaned-up version of the 400 million profiles database spilled in November last year, which contained lots of duplicates. According to threat actors, the data was […]. The post 200 Million Twitter Profiles Database Giveaway on Hacker Forum appeared first on Heimdal Security Blog.

article thumbnail

3 Ways to Defend a Cybersecurity Budget with Cyber Risk Quantification

Security Boulevard

Deloitte's “CFO Signals” Q4 2022 survey of chief financial officers found 41% feeling pessimistic about their companies’ financial outlook. Survey participants named “cost management” their number one priority for 2023. On the other hand, 79% said they intend to make new investments in the new year in “digital transformation.”. The post 3 Ways to Defend a Cybersecurity Budget with Cyber Risk Quantification appeared first on Security Boulevard.

article thumbnail

Arnold Clark Auto Retail Giant Was Victim of a Cyberattack on Christmas Eve

Heimadal Security

Arnold Clark, the Scottish automotive retail giant, announced that it suffered a cyberattack. An external cybersecurity firm identified abnormal activity on the company’s network on Christmas Eve. What Damage Has Been Done As a precaution, after the attack, Arnold Clark decided to shut down its network. This led to losing Internet connection, as well as […].

Retail 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!